banner
banner
banner

风险预警

    风险预警

    关于Microsoft Windows支持诊断工具 (MSDT) 远程代码执行漏洞的预警提示

    发布时间:2022-06-06 点击次数:[]

    一、漏洞详情

    近日监测到Microsoft Windows支持诊断工具(MSDT)远程代码执行漏洞(CVE-2022-30190)在野利用。该漏洞允许未经身份验证的远程攻击者通过office文档发起钓鱼攻击,当用户点击打开文档时,实现执行任意代码。本次通告公告更新影响版本、修复建议。

    建议受影响用户做好资产自查以及预防工作,以免遭受黑客攻击。

    二、影响范围

    Windows Server 2012 R2 (Server Core installation)

    Windows Server 2012 R2

    Windows Server 2012 (Server Core installation)

    Windows Server 2012

    Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)

    Windows Server 2008 R2 for x64-based Systems Service Pack 1

    Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)

    Windows Server 2008 for x64-based Systems Service Pack 2

    Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)

    Windows Server 2008 for 32-bit Systems Service Pack 2

    Windows RT 8.1

    Windows 8.1 for x64-based systems

    Windows 8.1 for 32-bit systems

    Windows 7 for x64-based Systems Service Pack 1

    Windows 7 for 32-bit Systems Service Pack 1

    Windows Server 2016 (Server Core installation)

    Windows Server 2016

    Windows 10 Version 1607 for x64-based Systems

    Windows 10 Version 1607 for 32-bit Systems

    Windows 10 for x64-based Systems

    Windows 10 for 32-bit Systems

    Windows 10 Version 21H2 for x64-based Systems

    Windows 10 Version 21H2 for ARM64-based Systems

    Windows 10 Version 21H2 for 32-bit Systems

    Windows 11 for ARM64-based Systems

    Windows 11 for x64-based Systems

    Windows Server, version 20H2 (Server Core Installation)

    Windows 10 Version 20H2 for ARM64-based Systems

    Windows 10 Version 20H2 for 32-bit Systems

    Windows 10 Version 20H2 for x64-based Systems

    Windows Server 2022 Azure Edition Core Hotpatch

    Windows Server 2022 (Server Core installation)

    Windows Server 2022

    Windows 10 Version 21H1 for 32-bit Systems

    Windows 10 Version 21H1 for ARM64-based Systems

    Windows 10 Version 21H1 for x64-based Systems

    Windows Server 2019 (Server Core installation)

    Windows Server 2019

    Windows 10 Version 1809 for ARM64-based Systems

    Windows 10 Version 1809 for x64-based Systems

    Windows 10 Version 1809 for 32-bit Systems

    三、修复建议

    版本升级

    使用office365/office 2019/2021的用户可以通过升级到15225.20204来缓解该漏洞的影响

    通过更新可以缓解Office的攻击入口向量,但并不能修复MSDT漏洞。用户可以使用360针对MSDT漏洞实现全方位拦截。

    升级方式如下:

    1.打开任何Office应用程序,例如WordExcel

    2.选择文件>帐户。

    3.选择Office更新->立即更新

    查看当前版本方式如下:

    1.打开任何Office应用程序,例如WordExcel

    2.选择文件>帐户。

    3.产品信息下,记下关于部分下的版本号。


    禁用MSDT URL协议

    禁用MSDT URL协议可防止故障排除程序作为链接启动,包括整个操作系统的链接。仍然可以使用获取帮助应用程序和系统设置中的其他或附加故障排除程序来访问故障排除程序。请按照以下步骤禁用:

    1.以管理员身份运行命令提示符。

    2.要备份注册表项,请执行命令“reg export HKEY_CLASSES_ROOT\ms-msdt filename ”

    3.执行命令“reg delete HKEY_CLASSES_ROOT\ms-msdt /f”

    如何撤消解决方法

    1.以管理员身份运行命令提示符。

    2.要恢复注册表项,请执行命令“reg import filename”

    Baidu